Fuzzy Identity-Based Dynamic Auditing of Big Data on Cloud Storage

被引:5
|
作者
Zhao, Chenbin [1 ,2 ]
Xu, Li [1 ,2 ]
Li, Jiguo [1 ,2 ]
Wang, Feng [1 ,2 ]
Fang, He [3 ]
机构
[1] Fujian Normal Univ, Coll Math & Informat, Fuzhou 350007, Fujian, Peoples R China
[2] Fujian Normal Univ, Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou 350007, Fujian, Peoples R China
[3] Western Univ, Dept Elect & Comp Engn, London, ON N6A 3K7, Canada
来源
IEEE ACCESS | 2019年 / 7卷
基金
中国国家自然科学基金;
关键词
Cloud computing; Servers; Cryptography; Big Data; Data integrity; Authentication; Big data; cloud storage; data integrity; dynamic operation; fuzzy identity-based; DATA POSSESSION;
D O I
10.1109/ACCESS.2019.2950938
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
To ensure the reliability and integrity of data in the cloud storage server, some scholars provided various data integrity auditing schemes. However, the most existing data integrity auditing schemes only support the static data and may be unsuitable for the dynamic operations of data. To overcome this difficulty, we propose a fuzzy identity-based dynamic auditing of big data, which combines the structure of the Merkle hash tree (MHT) with the Index logic table (ILT). Our scheme not only performs the dynamic operations of data block in the ILT, namely modification, insertion and deletion, but also efficiently executes dynamic operations of the ILT on the structure of the MHT. We also elaborate the security, characteristics and performance analysis of the proposed scheme separately. The analysis results show that the proposed scheme costs less time than the structure of the original MHT to generate the root node hash value during the metadata generation phase and update the root node hash value during the dynamic operations. Furthermore, when users store the new ILT in local storage, they require lower communication cost to update root node hash value than users without storing the ILT, and fewer interactions between the cloud storage server and users in the dynamic operations process.
引用
收藏
页码:160459 / 160471
页数:13
相关论文
共 50 条
  • [1] Identity-Based Dynamic Data Auditing for Big Data Storage
    Shang, Tao
    Zhang, Feng
    Chen, Xingyue
    Liu, Jianwei
    Lu, Xinxi
    [J]. IEEE TRANSACTIONS ON BIG DATA, 2021, 7 (06) : 913 - 921
  • [2] On Security of an Identity-Based Dynamic Data Auditing Protocol for Big Data Storage
    Li, Xiong
    Liu, Shanpeng
    Lu, Rongxing
    Zhang, Xiaosong
    [J]. IEEE TRANSACTIONS ON BIG DATA, 2021, 7 (06) : 975 - 977
  • [3] Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems
    Li, Yannan
    Yu, Yong
    Min, Geyong
    Susilo, Willy
    Ni, Jianbing
    Choo, Kim-Kwang Raymond
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2019, 16 (01) : 72 - 83
  • [4] Enabling Efficient User Revocation in Identity-Based Cloud Storage Auditing for Shared Big Data
    Zhang, Yue
    Yu, Jia
    Hao, Rong
    Wang, Cong
    Ren, Kui
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2020, 17 (03) : 608 - 619
  • [5] A Lightweight Identity-Based Remote Data Auditing Scheme for Cloud Storage
    Deng, Lunzhi
    Yang, Benjuan
    Wang, Xiangbin
    [J]. IEEE ACCESS, 2020, 8 : 206396 - 206405
  • [6] Insecurity of an identity-based public auditing protocol for the outsourced data in cloud storage
    He, Debiao
    Wang, Huaqun
    Zhang, Jianhong
    Wang, Lina
    [J]. INFORMATION SCIENCES, 2017, 375 : 48 - 53
  • [7] Identity-Based Public Auditing for Cloud Storage of Internet-of-Vehicles Data
    Tian, Hui
    Peng, Fang
    Quan, Hanyu
    Chang, Chin-Chen
    [J]. ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2022, 22 (04)
  • [8] Cryptanalysis of an identity-based public auditing protocol for cloud storage
    Wu, Li-bing
    Wang, Jing
    He, De-biao
    Khan, Muhammad-Khurram
    [J]. FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING, 2017, 18 (12) : 1972 - 1977
  • [9] Cryptanalysis of an identity-based public auditing protocol for cloud storage
    Li-bing Wu
    Jing Wang
    De-biao He
    Muhammad-Khurram Khan
    [J]. Frontiers of Information Technology & Electronic Engineering, 2017, 18 : 1972 - 1977
  • [10] RDIMM: Revocable and dynamic identity-based multi-copy data auditing for multi-cloud storage
    Guo, Zirui
    Zhang, Kai
    Wei, Lifei
    Chen, Siyuan
    Wang, Liangliang
    [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2023, 141